SAP Note 1298433 - Bypassing security in reginfo & secinfo

Component : Gateway/CPIC - Security

Solution : https://service.sap.com/sap/support/notes/1298433 (SAP Service marketplace login required)

Summary :
The SAP gateway vulnerability arises due to a kernel bug, leading to possible bypass of reginfo and secinfo settings, allowing unauthorized program communications. Affecting all kernel releases, a temporary gateway modification inconveniently restricted valid program registrations via SAProuter. To permanently resolve this, apply the latest kernel patch, set the gw/reg_no_coon_info parameter, and utilize secure connections through SNC-secured SAProuters or VPN tunnels. Firewall protection and monitoring via transaction SMGW are recommended as additional safeguards. Ensure correct parameter management, as advised in Note 1444282.

Key words :
downloading kernel releases 31i-45b, kernel releases 31i-45b, access control list, secure network communication, wide area network, virtual private network, parametergw/reg_no_conn_infoto activate, mainstream/extended maintenance, function module th_change_parameter, gw/sec_info reason

Related Notes :

1529849Gateway security setting in an SCS instance, AS Java
1465129CANCEL registered programs
1444282gw/reg_no_conn_info settings
1434117Bypassing sec_info without reg_info
1394093Collective Security Note
1391655Authorized access to SAPFTP
1391464Authorized access to SAPHTTP
1305851Overview note: reg_info and sec_info
1294105Core in gateway
1280641reginfo, secinfo: Changing #VERSION=2 does not work
1105897GW: reginfo and secinfo with permit and deny ACL
1069911GW: Changes to the ACL list of the gateway (reginfo)
888889Automatic checks for security notes using RSECNOTE